Security Challenges and Best Practices for IIoT.
Edita BajramovicDeeksha GuptaYun GuoKarl WaedtAnis BajramovicPublished in: GI-Jahrestagung (Workshops) (2019)
Keyphrases
- security problems
- information security
- security issues
- security concerns
- lessons learned
- real world
- security and privacy issues
- intelligence community
- security threats
- open issues
- intrusion detection
- case study
- security systems
- statistical databases
- information assurance
- technical challenges
- network security
- security mechanisms
- security model
- security policies
- computer security
- data integrity
- key issues
- functional requirements
- user authentication
- security level
- design patterns
- computer networks
- security measures
- computing infrastructure
- neural network